CCTV CODE OF PRACTICE
|
|
|
- Amos Hood
- 10 years ago
- Views:
Transcription
1 CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City, Clifton or Brackenhurst Campuses. Data Subjects means an individual who is a subject of personal data. NTU and the University both mean Nottingham Trent University. Security Manager shall mean, for the purposes of this policy, the member of staff with specific responsibility for management and control of the University s CCTV systems or his/her nominee. System means the University s CCTV Surveillance System including CCTV cameras. Contents 1. Introduction 2. Operation of the University s CCTV Surveillance System 3. Monitoring of CCTV Images 4. Recording of Images and Access 5. Complaints 6. Other Supporting Documents 7. Governance 1. Introduction 1.1 The University has installed a comprehensive CCTV surveillance system across all three campuses for the principal purposes of preventing and detecting crime. The images from the CCTV system can be monitored in the control rooms at each campus, which are staffed by the University s Security Department. It is recognised that ancillary benefits of operating CCTV for this purpose may include reduction of the fear of crime generally and the provision of a safer public environment for the benefit of those who live or work within and visit the University. 1.2 CCTV Cameras which are located within individual buildings are capable of being monitored by the Reception Officers of those buildings. If the Security Manager considers that the security of a College/School or Professional Services Department whose areas the cameras are designed to protect would be improved by allowing designated staff within that area to monitor the images, then relevant staff will be authorised to view the images. CCTV images monitored by Reception Officers will show live images only and will not include external cameras or give access to archived images 1.3 The University s CCTV surveillance system has been installed and is monitored in line with the following objectives:
2 To assist in the prevention and detection of crime; To facilitate the identification, apprehension and prosecution of offenders in relation to crime and public order; To aid public safety; and To assist with the management of the University s car parks. To assist Student and Staff Support Services in connection with disciplinary procedures in cases of serious misconduct; and To assist in room utilisation surveys. 1.4 Due to public concern surrounding a surveillance society, the use of CCTV surveillance must be consistent with respect for individuals privacy and due to this concern other methods of achieving the objectives of a CCTV surveillance system will be considered before installation of any CCTV camera on the University campuses. 1.5 This Code of Practice has been prepared for the guidance of University staff and students. Its purpose is to ensure that the CCTV system is used to create a safer environment for staff, students and visitors to the University and to ensure that its operation is consistent with the obligations on the University imposed by the Data Protection Act 1998, Article 8 of the Human Rights 1998 and The Security Industry Authority. For the purposes of the Data Protection Act 1998, the Data Controller is Nottingham Trent University. 2. Operation of the University s CCTV Surveillance System The System 2.1 The system is operational and images are capable of being monitored for twenty-four hours a day throughout the whole year. 2.2 The public and University community are made aware of the presence of the system by appropriate signage which sets out the purposes for processing the CCTV images and identifies the University as the party responsible for processing those images. 2.3 To ensure privacy, wherever practicable, the CCTV cameras are prevented from focusing or dwelling on domestic accommodation. Where domestic areas such as gardens abut those areas which are intended to be covered by the scheme, the Security Manager will consult with the owners of the domestic area to discuss what images may be recorded. Where it is not practicable to prevent the cameras from focusing or dwelling on such areas or where domestic areas abut the areas which are intended to covered, appropriate training will be given to system operators to ensure that they are made aware that they should not be monitoring such areas. 2.4 Images captured by cameras will be recorded on equipment located securely within University buildings. All security control rooms will have monitoring equipment which will allow control room officers to monitor live images from the cameras, any transfer of images onto other media will only take place within the City Control room in line with this Code of Practice. 2.5 Although every reasonable effort has been made in the planning and design of the CCTV system to give it maximum effectiveness, it is not possible to guarantee that the system will detect every incident taking place within the areas of coverage.
3 Control Rooms 2.6 Images captured by the system will be monitored in the self-contained and secure Control Rooms. CCTV cameras monitored by Reception Officers show live images only. 2.7 Access to Control Rooms is strictly limited to the Duty Controllers, authorised staff members and Senior Management. Police Officers may enter with the explicit consent of the Security Manager. Other persons may be authorised to enter the Control Room on a case-by-case basis with the explicit consent of the Security Manager with each visit being supervised at all times. 2.8 In an emergency, and where it is not reasonably practicable to secure prior authorisation, access may be granted to persons with a legitimate reason to enter the Control Room. Before access is granted to any person, the Security Manager must be satisfied with the identity of any visitor. 2.9 All visitors will be required to complete and sign a visitors log which will be kept in the Control Room An incident log will be maintained in the Control Room with full details of security incidents including those captured on CCTV which are transferred to another medium, together with any consequential action taken Handling of images and information within the Control Rooms will be done in accordance with this Code of Practice and the Data Protection Act The Security Manager will be responsible for compliance with section above and for the development of working procedures within the control room to ensure such compliance. 3. Monitoring of CCTV Images 3.1 The Security Manager will ensure that all staff (including relief/temporary staff) are fully briefed and trained in respect to all functions, both operational and administrative, arising within the operation of CCTV surveillance including training in the requirements of this Code of Practice and the Data Protection Act The control of the CCTV Surveillance System will always remain with the University. However, at the Security Manager s discretion, the cameras may be operated in accordance with requests made by the police during an incident to monitor potential public disorder, assist in the detection of crime or facilitate the apprehension and prosecution of offenders in relation to crime and public order. On each occasion the Police are assisted with their operations, a report setting out the time, date and detail of the incident will be submitted to the Security Manager. 3.3 CCTV images which evidence any behaviour, which cannot reasonably be ignored, may be used for staff and student disciplinary purposes. Covert Monitoring 3.4 Covert monitoring will only be considered in exceptional circumstances. Deployment will be subject to the completion of an impact assessment 1, in line with Part 3 of the ICO s Data Protection, Employment Practices Code and approval 1 The impact assessment should be completed by the manager appointed to investigate the alleged misconduct.
4 by both the Security Manager and the Director of Human Resources or PVC for Student Affairs, in the case of students. 3.5 Circumstances where covert monitoring may be considered include; where there are grounds for suspecting criminal activity or equivalent malpractice, where notifying the individuals about the monitoring would prejudice its prevention or detection. 3.6 Where covert monitoring is approved, it must be strictly targeted at obtaining evidence within a set timeframe and must cease once the investigation is complete. 3.7 Images recorded of individuals not under suspicion will be deleted. 4. Recording of Images and Access Control and Management of Recordings 4.1 All recording media used for the monitoring and capture of images on the University s CCTV system belongs to and remains the property of the University. 4.2 The Control Rooms are supported by a digital recording system which stores images on appropriate media until capacity is reached and the images are then automatically overwritten. 4.3 Should it be decided that images be retained for any reason, including for release to a third party (including the Police) under the exemptions contained within sections 28(1), 29(1)(a) and (b) and/or 35(2)(a) of the Data Protection Act 1998, or retained for any reason for which the system is registered with the Information Commissioner, copies of those images may be transferred to an appropriate computer file. 4.4 Any file stored in line with above shall be given a unique reference number by the person creating the file and a record made in an image tracking register contained within the control room. 4.5 Unless required for any of the reasons contained within Section 29(3) of the Data protection Act 1968, recorded images will be retained for no longer than required for the purpose for which they were originally obtained, after that time the images are automatically overwritten by the recording equipment (currently 7 days) 4.6 Any recording medium will be cleaned before re-use to ensure that images are not recorded on top of images previously recorded. Access to Recordings by Staff or Third Parties 4.7 It is important that access to and disclosure of images is restricted and carefully controlled, not only to ensure that the rights of individuals are preserved but also to ensure that the chain of evidence remains intact should the images be required for evidential purposes. These aspects of the Code of Practice reflect the Second and Seventh Data Protection Principles of the Data Protection Act Access to recorded images will be restricted to security staff and those staff who require access, following the consent of the Security Manager, in order to achieve the purposes of using the equipment.
5 4.9 Requests by persons outside the University (other than the Police) for viewing or obtaining recordings will be assessed on a case by case basis by the Security Manager and access will only be granted where it is consistent with the obligations placed on the University by the Data Protection Act All requests for access will be recorded detailing the date and time at which access was allowed/or disclosure made; the reason for the access/disclosure; the extent of the information accessed/disclosed; name of the security staff providing access If access to images is denied to any member of staff or third party (including the Police), the Security Manager will document the reasons for the denial and the information will be logged at the Control Room Where it is decided by the Security Manager that the assistance of a member of University staff is needed to identify a victim, witness or perpetrator in relation to a criminal incident, images from the system may be circulated via the University s system to selected staff on a targeted basis, or placed on a suitably restricted area of the University s website. As part of that decision, the wishes of the victim of an incident will, where possible, be taken into account. Access by the Police 4.13 Where a police officer requests access to CCTV images either by viewing such data or requesting a copy of the data, the requisite form (held by Security) must be completed and signed Requests for access to images by the Police will not normally be denied and can be made without the authority of the Security Manager provided they are accompanied by a written request signed by a Police Officer, who must indicate that the images are required for the purposes of a specific crime enquiry. Access by Data Subjects 4.15 The University will comply with section 7 of the Data Protection Act 1998 in informing individuals whether or not information relating to them (in this case images) have been processed by the CCTV Surveillance System. The University is not obliged to comply with a request under this section unless it is supplied with such information as it may reasonably require to satisfy itself as to the identify of the person making the request and to locate the information which that person seeks Data Subjects may make a subject access request for CCTV images/recordings/information (request for data about themselves) by using the required form which is available from gp.html and must provide the following information: Dates and times of the incident or their visit to the University with details of the location on the NTU campus; two photographs one full face and one side view; proof of identity (e.g. driving licence/passport containing a photograph); Cheque or cash in the sum of 10.00; Whether they require copies or view of the images in question A written decision will be sent to the data subject within 21 days of receipt of the request. If access is agreed, such access will be provided within 40 days of
6 receipt of the request or, if later, on the date when the University receives confirmation of identification from the data subject Where the University is unable to comply with a subject access request without disclosing information relating to another individual who can be identified from that information, it is not obliged to comply with the request unless that individual has consented to the disclosure or it is reasonable, in the circumstances, to comply without the consent of the individual. 5. Complaints 5.1 Breaches of this Code by Security, Reception and other staff monitoring the system or who have access to the monitored images may constitute matters of discipline under the relevant conditions of employment. 5.2 It is also recognised that other members of the University may have concerns or complaints in respect to the operation of the CCTV Surveillance System. Any concerns or complaints should, in the first instance, be addressed to the Security Manager. 5.3 Concerns or queries relating to the Data Protection Principles in general should be directed to Legal Services. 6. Other Supporting Documents Corporate Guidelines on Data Protection. Enrolment Conditions for use of student data. 7. Governance Responsibility Policy Owner The Security & Operations Manager Version Control and Change History Version Approval Date Approved by Amendment Number 1.0 January 2009 New Policy 1.1 December 2009 Annual Review 2.0 June 2011 Revised Version Document Review The Policy and Procedure will be reviewed by the Security & Operations Manager in association with Legal Services, the trade unions, employee representatives (where appropriate) and managers in response to statutory changes, changes in University procedures or structures or as a result of the monitoring of the application of the procedure. In any event, the Policy and Procedure will be reviewed every two years.
CCTV PROCEDURES To support Information Security Policy Framework
CCTV PROCEDURES To support Information Security Policy Framework Section HERIOT-WATT UNIVERSITY PROCEDURES FOR OPERATION OF CCTV ON UNIVERSITY PREMISES TO SUPPORT INFORMATION SECURITY POLICY FRAMEWORK
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),
DATE OF INFORMATION SHARING AGREEMENT JULY 2015 PARTIES (1) LIVE NATION (MUSIC) UK LIMITED (Company Number 02409911) whose registered office is at 2 nd Floor, Regent Arcade House, 19-25 Argyll Street,
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10
UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
University of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them
CCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Photography and filming in schools Code of Practice
Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data
Policy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement 1. Context The University security service provides night and weekend cover throughout the
Quick guide to the employment practices code
Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment
Data protection policy
Data protection policy Introduction The College is required to keep certain information about employees, students and other users to allow it to monitor performance, achievements, health and safety, recruitment
Data Protection Policy
Data Protection Policy Introduction The Data Protection Act 1998 gives individuals the right to know what personal information is held about them. It provides a framework to ensure that the Office of the
Police Officers who Commit Domestic Violence-Related Criminal Offences 1
PUBLIC DOCUMENT Association of Chief Police Officers of England, Wales and Northern Ireland Police Officers who Commit Domestic Violence-Related Criminal Offences 1 This is an ACPO policy relating to police
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
PS 172 Protective Monitoring Policy
PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;
Human Resources and Data Protection
Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council
John Leggott College. Data Protection Policy. Introduction
John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
WEST MIDLANDS POLICE Force Policy Document
WEST MIDLANDS POLICE Force Policy Document POLICY TITLE: POLICY REFERENCE NO: POLICE STAFF DISCIPLINARY PROCEDURE HR/06 Executive Summary The Force expects certain standards of conduct to be maintained
Otley Town Council. Disciplinary Policy. Date Approved: 17 th February 2014 Revision Date:
Otley Town Council Disciplinary Policy Date Approved: 17 th February 2014 Revision Date: OTLEY TOWN COUNCIL DISCIPLINARY POLICY 1.0 Introduction 1.1 This policy is based on and complies with the 2009 ACAS
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets
MODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health
COUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
Policy C11 Staff Disciplinary Policy and Procedure
Policy C11 Staff Disciplinary Policy and Procedure Providing a Clear Framework to Help Promote Good Employment Relations Disciplinary rules and procedures provide guidance to employees on the standards
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Records Retention and Disposal Schedule. Information Management
Records Retention and Disposal Schedule Information Management Version control Version Author Policy Approved By Approval Date Publication Date Review Due V 1.0 Information Governance Unit Philip Jones,
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Criminal Justice (Scotland) Bill [AS INTRODUCED]
Criminal Justice (Scotland) Bill [AS INTRODUCED] CONTENTS Section PART 1 ARREST AND CUSTODY CHAPTER 1 ARREST BY POLICE 1 Power of a constable 2 Exercise of the power Arrest without warrant Procedure following
Floyd Healthcare Management, Inc. Notice of Privacy Practices
Floyd Healthcare Management, Inc. Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW
Children s Hearings (Scotland) Act 2011 2011 asp 1
Children s Hearings (Scotland) Act 2011 (asp 1) Section Children s Hearings (Scotland) Act 2011 2011 asp 1 CONTENTS PART 1 THE NATIONAL CONVENER AND CHILDREN S HEARINGS SCOTLAND The National Convener and
CODE OF PRACTICE 9. HMRC investigations where we suspect tax fraud
CODE OF PRACTICE 9 HMRC investigations where we suspect tax fraud The HMRC Investigation of Fraud Statement (i) The Commissioners of HMRC reserve complete discretion to pursue a Criminal investigation
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015
Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support
FLEXIBLE WORKER GUIDELINES DISCIPLINARY PROCEDURES
FLEXIBLE WORKER GUIDELINES DISCIPLINARY PROCEDURES NHS Professionals disciplinary guidelines for flexible workers July 2014 1 1. Scope These procedures are to be used for breaches of discipline or complaints
ROYAL HOLLOWAY University of London. DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff)
APPROVED BY COUNCIL September 2002 ROYAL HOLLOWAY University of London DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff) Disciplinary Policy and Procedure September 2002
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
COBAR SHIRE COUNCIL FILE:P5-90
COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...
Data Protection Act, 2005 - Summary Of Consequences
DATA PROTECTION ACT 1998 UNDERTAKING Data Controller: Caerphilly County Borough Council/ Cyngor Bwrdeistref Sirol Caerffili Penallta House Tredomen Park Ystradmynach Hengoed Mid Glamorgan CF82 7PG I, Chris
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Domestic Violence, Dating Violence, and Stalking Policy Statement
Domestic Violence, Dating Violence, and Stalking Policy Statement Introduction The University of West Georgia is committed to providing a safe learning and working environment for all. In order to comply
Video surveillance at EFSA Implementing rules and technical specifications
Video surveillance at EFSA Implementing rules and technical specifications PUBLIC version 1 Introduction EFSA operates a video surveillance system (hereafter VSS) for the safety and security of its buildings,
GUIDANCE FOR EMPLOYED BARRISTERS. Part 1. General
GUIDANCE FOR EMPLOYED BARRISTERS Part 1. General 1.1 This guidance has been issued by the Professional Standards Committee, the Professional Conduct and Complaints Committee and the Employed Barristers
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY
BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY 1 HALL SQUARE, BOROUGHBRIDGE, NORTH YORKSHIRE, YO51 9AN www.boroughbridge.org.uk [email protected] Tel: 01423 322956 BOROUGHBRIDGE
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
High Peak CVS Disciplinary Policy and Procedure
High Peak CVS Disciplinary Policy and Procedure The effectiveness and credibility of HIGH PEAK CVS and its employees is dependent to a large extent on the ability to achieve and preserve high standards
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
[EMPLOYERS NAME AND ADDRESS]
THIS CONTRACT HAS BEEN PROVIDED BY WITHY KING SOLICITORS FOR MEMBERS OF ANA THIS IS FOR GUIDANCE ONLY. IS YOUR RESPONSIBILITY TO ENSURE ITS LEGAL CONTENT. Contracts Drawing up a contract at the beginning
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Standards, Performance and Attendance Policy
Standards, Performance and Attendance Policy 1. Purpose Monitor s Standards, Performance and Attendance Policy (the Policy) describes the standard of conduct required of people working for Monitor on and/or
DATA PROTECTION AUDIT GUIDANCE
DATA PROTECTION AUDIT GUIDANCE CONTENTS Section I: Section II: Audit of Processing of Personal Data Audit Procedure Appendices: A B C D E Audit Form List of Purposes List of data subjects List of data
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Providing a Clear Framework to Help Promote Good Employment Relations Disciplinary rules and procedures provide guidance to employees on the standards and conduct expected
Disclosing Information - The Data Protection Act, 2002
Disclosing information to prevent or detect crime the section 25 exemption This guidance note explains what you need to consider when you are requested to disclose personal information to assist in the
Connecticut Carpenters Health Fund Privacy Notice
Connecticut Carpenters Health Fund Privacy Notice THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
Do you have a private life at your workplace?
Do you have a private life at your workplace? Privacy in the workplace in EC institutions and bodies Giovanni Buttarelli In the course of his supervisory activities, the EDPS has published positions on
Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930
Security Classification: NOT PROTECTIVELY MARKED Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930 Association of Chief
SDC-League Health Fund
SDC-League Health Fund 1501 Broadway, 17 th Floor New York, NY 10036 Tel: 212-869-8129 Fax: 212-302-6195 E-mail: [email protected] NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION
Surveillance Camera Code of Practice. June 2013
Surveillance Camera Code of Practice June 2013 Surveillance Camera Code of Practice Presented to Parliament Pursuant to Section 30 (1) (a) of the Protection of Freedoms Act 2012 June 2013 London: The Stationery
8 July 2015 CRIMINAL JUSTICE (Victims of Crime) BILL 2015 GENERAL SCHEME CONTENTS PART 1 PRELIMINARY. PART 2 Information for Victims
1 P a g e 8 July version Preamble Head 8 July 2015 CRIMINAL JUSTICE (Victims of Crime) BILL 2015 GENERAL SCHEME 1. Short title and commencement 2. Interpretation 3. Expenses CONTENTS PART 1 PRELIMINARY
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
Data Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy The success of the University is dependent on its most important resource, its staff. It is therefore vital that all employees are encouraged to work to the best
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
SCHEDULE 18. Premises. This Schedule 18 sets out certain terms relating to the Service Provider s Premises.
Business Operations- Schedule 18 (Premises) SCHEDULE 18 Premises This Schedule 18 sets out certain terms relating to the Service Provider s Premises. 1. Service Provider's Premises The following provisions
LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT
LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT Law-enforcement agencies in Virginia continue to enjoy one of the broadest exemptions for releasing information in all of the states. The Virginia
Physical Security Policy
London School of Economics & Political Science Physical Security Policy Final Draft: 06/11/12 Approved by Estates Strategy Committee: 22/05/13 Next Review Date: 22/05/14 London School of Economics Physical
Access to Health Records
Access to Health Records Crown Heights Medical Centre Procedure Access to Health Records ACCESS TO MEDICAL RECORDS (DATA PROTECTION) POLICY INTRODUCTION The Access to Health Records Act 1990 gave individuals
SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
